Insights & IntelligenceWed, 27 Nov 2019 05:00:00 +0000Sun, 07 Jun 2020 00:52:47 +0000Libsyn WebEngine 2.0http://www.chertoffgroup.com
enhttp://www.chertoffgroup.cominfo@chertoffgroup.com (info@chertoffgroup.com)http://static.libsyn.com/p/assets/e/9/2/3/e923607fcba0b032/TCG_PodcastLogo_Vertical.jpgInsights & IntelligenceThe Chertoff Grouptechnologycleanernesto@throughthenoise.usepisodic064 The War Against DisinformationThe War Against DisinformationWed, 27 Nov 2019 05:00:00 +0000The use of disinformation isn’t new, but finding the truth has become more challenging as our adversaries employ sophisticated tools to manipulate perception. The Chertoff Group’s Adam Isles speaks with national security expert J.D. Maddox about the nature of disinformation campaigns, why companies should be concerned, and what can be done to prevent the spread of disinformation. He warns corporations that it’s a matter of time before sophisticated disinformation campaigns are used against them.]]>The use of disinformation isn’t new, but finding the truth has become more challenging as our adversaries employ sophisticated tools to manipulate perception. The Chertoff Group’s Adam Isles speaks with national security expert J.D. Maddox about the nature of disinformation campaigns, why companies should be concerned, and what can be done to prevent the spread of disinformation. He warns corporations that it’s a matter of time before sophisticated disinformation campaigns are used against them.]]>20:50cleanThe use of disinformation isn’t new, but finding the truth has become more challenging as our adversaries employ sophisticated tools to manipulate perception. The Chertoff Group’s Adam Isles speaks with national security expert J.D. Maddox about the nature of disinformation campaigns, why companies should be concerned, and what can be done to prevent the spread of disinformation. He warns corporations that it’s a matter of time before sophisticated disinformation campaigns are used against them.64full063 When the Threats are PhysicalWhen the Threats are PhysicalMon, 04 Nov 2019 05:00:00 +0000While cybersecurity is often top of mind for many companies, physical threats such as active shooters are emerging as major risks to people and businesses too. The Chertoff Group’sJayson Aherndiscusses the roles and responsibilities of leadership in guarding against these threats, how chief security officers can work with the organization, and how often companies should assess their risks.]]>While cybersecurity is often top of mind for many companies, physical threats such as active shooters are emerging as major risks to people and businesses too. The Chertoff Group’s Jayson Ahern discusses the roles and responsibilities of leadership in guarding against these threats, how chief security officers can work with the organization, and how often companies should assess their risks.]]>17:37cleanWhile cybersecurity is often top of mind for many companies, physical threats such as active shooters are emerging as major risks to people and businesses too. The Chertoff Group’s Jayson Ahern discusses the roles and responsibilities of leadership in guarding against these threats, how chief security officers can work with the organization, and how often companies should assess their risks.63full062 Security the EnterpriseSecurity the EnterpriseMon, 28 Oct 2019 04:00:00 +0000Chertoff Group Senior AdvisorBob Pocica, who began his career at the FBI and served in various security roles at major corporations, discusses enterprise risk management. He talks about the importance of bringing physical and cybersecurity areas of a company together, and why it’s necessary for organizations to have a senior individual in charge of these threats. He urges Chief Security Officers to be proactive and offers this: You can’t over-communicate when it comes to security. ]]>Chertoff Group Senior Advisor Bob Pocica, who began his career at the FBI and served in various security roles at major corporations, discusses enterprise risk management. He talks about the importance of bringing physical and cybersecurity areas of a company together, and why it’s necessary for organizations to have a senior individual in charge of these threats. He urges Chief Security Officers to be proactive and offers this: You can’t over-communicate when it comes to security. ]]>27:46cleanChertoff Group Senior Advisor Bob Pocica, who began his career at the FBI and served in various security roles at major corporations, discusses enterprise risk management. He talks about the importance of bringing physical and cybersecurity areas of a company together, and why it’s necessary for organizations to have a senior individual in charge of these threats. He urges Chief Security Officers to be proactive and offers this: You can’t over-communicate when it comes to security. 62full061 From the Wild Blue Yonder to the Corporate WorldFrom the Wild Blue Yonder to the Corporate WorldMon, 21 Oct 2019 04:00:00 +0000The Chertoff Group’sBrian Hesstraces his career in the U.S. Air Force – from deployment to his work at the Pentagon as a Nuclear Security Policy Officer. He discusses how the lessons he learned in the military can apply to the corporate world. How can we break down the barriers that exist between physical and cyber within organizations? He stresses the importance of working with teams to guard against threats.]]>The Chertoff Group’s Brian Hess traces his career in the U.S. Air Force – from deployment to his work at the Pentagon as a Nuclear Security Policy Officer. He discusses how the lessons he learned in the military can apply to the corporate world. How can we break down the barriers that exist between physical and cyber within organizations? He stresses the importance of working with teams to guard against threats.]]>24:42cleanThe Chertoff Group’s Brian Hess traces his career in the U.S. Air Force – from deployment to his work at the Pentagon as a Nuclear Security Policy Officer. He discusses how the lessons he learned in the military can apply to the corporate world. How can we break down the barriers that exist between physical and cyber within organizations? He stresses the importance of working with teams to guard against threats.61full060 Investing in Space Investing in SpaceMon, 14 Oct 2019 04:00:00 +0000What is the state of the market when it comes to space and missile defence?

The Chertoff Group’sKristjan Kornmayer, who recently published theSpace and Missile Defense Market Review, discusses a recent space and missile defence symposium and where he sees major areas of investment from the government and private sector.

]]>What is the state of the market when it comes to space and missile defence?

The Chertoff Group’s Kristjan Kornmayer, who recently published the Space and Missile Defense Market Review, discusses a recent space and missile defence symposium and where he sees major areas of investment from the government and private sector.

]]>20:51cleanWhat is the state of the market when it comes to space and missile defence?
The Chertoff Group’s Kristjan Kornmayer, who recently published the Space and Missile Defense Market Review, discusses a recent space and missile defence symposium and where he sees major areas of investment from the government and private sector.60full059 The Role of States in CybersecurityThe Role of States in CybersecurityMon, 07 Oct 2019 04:00:00 +0000Maggie Brunner of the National Governors Association discusses the steps that states are taking when it comes to cybersecurity. It’s everything from ensuring election security, dealing with ransomware threats, to protecting the electric grid. She highlights an innovative pilot program with seven states to improve cybersecurity, as well as the National Guard’s role in helping states with cyber threats.]]>Maggie Brunner of the National Governors Association discusses the steps that states are taking when it comes to cybersecurity. It’s everything from ensuring election security, dealing with ransomware threats, to protecting the electric grid. She highlights an innovative pilot program with seven states to improve cybersecurity, as well as the National Guard’s role in helping states with cyber threats.]]>19:15cleanMaggie Brunner of the National Governors Association discusses the steps that states are taking when it comes to cybersecurity. It’s everything from ensuring election security, dealing with ransomware threats, to protecting the electric grid. She highlights an innovative pilot program with seven states to improve cybersecurity, as well as the National Guard’s role in helping states with cyber threats.59full058 Threats Along the Way: Securing the International Supply ChainThreats Along the Way: Securing the International Supply ChainMon, 30 Sep 2019 04:00:00 +0000The Chertoff Group’s Jayson Ahern talks about the importance of international supply chain security, and the delicate balance that must be maintained to keep goods flowing across our border. Public-private partnerships are setting standards to ensure legitimate goods come in, and the threats stay out. He discusses why companies need to understand – and guard against – risks in the international supply chain. ]]>The Chertoff Group’s Jayson Ahern talks about the importance of international supply chain security, and the delicate balance that must be maintained to keep goods flowing across our border. Public-private partnerships are setting standards to ensure legitimate goods come in, and the threats stay out. He discusses why companies need to understand – and guard against – risks in the international supply chain. ]]>16:34cleanThe Chertoff Group’s Jayson Ahern talks about the importance of international supply chain security, and the delicate balance that must be maintained to keep goods flowing across our border. Public-private partnerships are setting standards to ensure legitimate goods come in, and the threats stay out. He discusses why companies need to understand – and guard against – risks in the international supply chain. 58full057 Wanted: Director of National IntelligenceWanted: Director of National IntelligenceMon, 23 Sep 2019 04:00:00 +0000What makes a good Director of National Intelligence? In the wake of the recent retirement of National Intelligence Director Dan Coats and the resignation of principal deputy director Sue Gordon, Chertoff Group Principal Charles Allen discusses what the Office of the Director of National Intelligence means to the security of the United States. Allen, who had a 40-year career with the CIA, talks about the importance of the office and the type of leader that the role requires. ]]>What makes a good Director of National Intelligence? In the wake of the recent retirement of National Intelligence Director Dan Coats and the resignation of principal deputy director Sue Gordon, Chertoff Group Principal Charles Allen discusses what the Office of the Director of National Intelligence means to the security of the United States. Allen, who had a 40-year career with the CIA, talks about the importance of the office and the type of leader that the role requires. ]]>14:17cleanWhat makes a good Director of National Intelligence? In the wake of the recent retirement of National Intelligence Director Dan Coats and the resignation of principal deputy director Sue Gordon, Chertoff Group Principal Charles Allen discusses what the Office of the Director of National Intelligence means to the security of the United States. Allen, who had a 40-year career with the CIA, talks about the importance of the office and the type of leader that the role requires. 57full056 18 Years Later: The State of Homeland Security18 Years Later: The State of Homeland SecurityMon, 16 Sep 2019 18:30:10 +0000The Senate Homeland Security and Government Affairs Committee reflected on today’s national security challenges during a recent hearing titled “18 Years Later: The state of Homeland Security After 9/11.” Chertoff Group Executive Chairman Michael Chertoff, who served as the second U.S. Homeland Security Secretary, testified about the collective work done to prevent this type of event from occurring again and where further investment and attention is needed to protect the safety and security of the American people. ]]>The Senate Homeland Security and Government Affairs Committee reflected on today’s national security challenges during a recent hearing titled “18 Years Later: The state of Homeland Security After 9/11.” Chertoff Group Executive Chairman Michael Chertoff, who served as the second U.S. Homeland Security Secretary, testified about the collective work done to prevent this type of event from occurring again and where further investment and attention is needed to protect the safety and security of the American people. ]]>09:32cleanThe Senate Homeland Security and Government Affairs Committee reflected on today’s national security challenges during a recent hearing titled “18 Years Later: The state of Homeland Security After 9/11.” Chertoff Group Executive Chairman Michael Chertoff, who served as the second U.S. Homeland Security Secretary, testified about the collective work done to prevent this type of event from occurring again and where further investment is needed to protect the safety and security of the American people. full055 ‘After That Moment, Things Would Never Be the Same:’ Reflections on 9/11 ‘After That Moment, Things Would Never Be the Same:’ Reflections on 9/11 Mon, 09 Sep 2019 04:00:00 +0000It’s been nearly 20 years since the terrorist attacks of September 11, 2001. The Chertoff Group’s Jayson Ahern, Charles Allen, Adam Isles, General Michael Hayden, and Lee Kair reflect on a day that changed America, and share stories about how it influenced their careers. They had a front-row seat to what happened on one of the country’s darkest days — and witnessed a nation that rose to the challenge. ]]>It’s been nearly 20 years since the terrorist attacks of September 11, 2001. The Chertoff Group’s Jayson Ahern, Charles Allen, Adam Isles, General Michael Hayden, and Lee Kair reflect on a day that changed America, and share stories about how it influenced their careers. They had a front-row seat to what happened on one of the country’s darkest days — and witnessed a nation that rose to the challenge. ]]>29:03cleanIt’s been nearly 20 years since the terrorist attacks of September 11, 2001. The Chertoff Group’s Jayson Ahern, Charles Allen, Adam Isles, General Michael Hayden, and Lee Kair reflect on a day that changed America, and share stories about how it influenced their careers. They had a front-row seat to what happened on one of the country’s darkest days — and witnessed a nation that rose to the challenge. 55full054 Ensuring Election IntegrityEnsuring Election IntegrityMon, 26 Aug 2019 04:00:00 +0000How can the U.S. ensure the security of its elections and protect democracy? The Chertoff Group’sAdam Islesdiscusses vulnerabilities in election security and strategies to guard against attacks withPhilipReitinger, president and CEO of the Global Cyber Alliance. Reitinger talks about some basic steps to cut your cyber risk and cautions that the Internet of Things will present new challenges that we’ve yet to grasp.]]>How can the U.S. ensure the security of its elections and protect democracy? The Chertoff Group’s Adam Isles discusses vulnerabilities in election security and strategies to guard against attacks with Philip Reitinger, president and CEO of the Global Cyber Alliance. Reitinger talks about some basic steps to cut your cyber risk and cautions that the Internet of Things will present new challenges that we’ve yet to grasp.]]>19:15cleanHow can the U.S. ensure the security of its elections and protect democracy? The Chertoff Group’s Adam Isles discusses vulnerabilities in election security and strategies to guard against attacks with Philip Reitinger, president and CEO of the Global Cyber Alliance. Reitinger talks about some basic steps to cut your cyber risk and cautions that the Internet of Things will present new challenges that we’ve yet to grasp.54full053 Securing the Vote: What it TakesSecuring the Vote: What it TakesMon, 19 Aug 2019 04:00:00 +0000Attacks on the U.S. election system and those around the world are designed to sow doubt and undermine confidence, creating challenges for democracies around the world.Adam IslesandMichael Chertoffdiscuss how we protect the integrity of elections – from campaigns, voters, and the voting system itself. It requires a public-private partnership, and individual citizens have a role to play. Chertoff cautions that we must use our imagination to prepare for the attacks we haven’t seen. ]]>Attacks on the U.S. election system and those around the world are designed to sow doubt and undermine confidence, creating challenges for democracies around the world. Adam Isles and Michael Chertoff discuss how we protect the integrity of elections – from campaigns, voters, and the voting system itself. It requires a public-private partnership, and individual citizens have a role to play. Chertoff cautions that we must use our imagination to prepare for the attacks we haven’t seen. ]]>12:30cleanAttacks on the U.S. election system and those around the world are designed to sow doubt and undermine confidence, creating challenges for democracies around the world. Adam Isles and Michael Chertoff discuss how we protect the integrity of elections – from campaigns, voters, and the voting system itself. It requires a public-private partnership, and individual citizens have a role to play. Chertoff cautions that we must use our imagination to prepare for the attacks we haven’t seen.
53full052 Entering the Brave New World of AIEntering the Brave New World of AIMon, 12 Aug 2019 04:00:00 +0000Artificial Intelligence (AI) is the ability of computer systems and algorithms to simulate human responses and then learn and adapt. It holds great potential to bring innovation across a number of sectors. But it also raises a host of moral, legal and ethical questions. The Chertoff Group’sPaul Rosenzweigdiscusses the challenges and dilemmas this technology creates. How far are we willing to go in putting our faith in AI, and can we design it in a way that aligns with our values?]]>Artificial Intelligence (AI) is the ability of computer systems and algorithms to simulate human responses and then learn and adapt. It holds great potential to bring innovation across a number of sectors. But it also raises a host of moral, legal and ethical questions. The Chertoff Group’s Paul Rosenzweig discusses the challenges and dilemmas this technology creates. How far are we willing to go in putting our faith in AI, and can we design it in a way that aligns with our values?]]>21:29cleanArtificial Intelligence (AI) is the ability of computer systems and algorithms to simulate human responses and then learn and adapt. It holds great potential to bring innovation across a number of sectors. But it also raises a host of moral, legal and ethical questions. The Chertoff Group’s Paul Rosenzweig discusses the challenges and dilemmas this technology creates. How far are we willing to go in putting our faith in AI, and can we design it in a way that aligns with our values?52full051 It’s What’s Inside that CountsIt’s What’s Inside that CountsMon, 05 Aug 2019 04:00:00 +0000Software has traditionally been a black box when it comes to knowing what’s inside.

Allan Friedman,director of Cybersecurity Initiatives at the National Telecommunications and Information Administration, discusses the Software Component Transparency initiative and efforts to establish a software bill of materials. It’s akin to a list of ingredients associated with a particular piece of software to help stakeholders make better risk-management decisions. What will make this a reality?

]]>Software has traditionally been a black box when it comes to knowing what’s inside.

Allan Friedman, director of Cybersecurity Initiatives at the National Telecommunications and Information Administration, discusses the Software Component Transparency initiative and efforts to establish a software bill of materials. It’s akin to a list of ingredients associated with a particular piece of software to help stakeholders make better risk-management decisions. What will make this a reality?

]]>27:01cleanSoftware has traditionally been a black box when it comes to knowing what’s inside.
Allan Friedman, director of Cybersecurity Initiatives at the National Telecommunications and Information Administration, discusses the Software Component Transparency initiative and efforts to establish a software bill of materials. It’s akin to a list of ingredients associated with a particular piece of software to help stakeholders make better risk-management decisions. What will make this a reality?51full050 A Turning Point for Artificial IntelligenceA Turning Point for Artificial IntelligenceMon, 29 Jul 2019 04:00:00 +0000Artificial Intelligence (AI) is an incredibly powerful tool to help us make predictions, offering the promise of huge advances across all economic sectors and the government. But how do we define AI, what are its benefits, and how can it be applied in a way that’s consistent with our values?

Carol Kuntz, a senior advisor with the Chertoff Group, discusses where AI is used today and some thoughts on how we govern its use in the future. She argues that the technology is at a place where public policy choices need to be made about its use.

]]>Artificial Intelligence (AI) is an incredibly powerful tool to help us make predictions, offering the promise of huge advances across all economic sectors and the government. But how do we define AI, what are its benefits, and how can it be applied in a way that’s consistent with our values?

Carol Kuntz, a senior advisor with the Chertoff Group, discusses where AI is used today and some thoughts on how we govern its use in the future. She argues that the technology is at a place where public policy choices need to be made about its use.

]]>23:17cleanArtificial Intelligence (AI) is an incredibly powerful tool to help us make predictions, offering the promise of huge advances across all economic sectors and the government. But how do we define AI, what are its benefits, and how can it be applied in a way that’s consistent with our values? Carol Kuntz, a senior advisor with the Chertoff Group, discusses where AI is used today and some thoughts on how we govern its use in the future. 50full049 Guarding the Nation’s Critical InfrastructureGuarding the Nation’s Critical InfrastructureMon, 22 Jul 2019 04:00:00 +0000The electric grid is often described as a lifeline sector for the nation’s critical infrastructure. But most of this sector is privately owned. How can the government and private sector work together to protect the nation’s critical infrastructure?

The Chertoff Group’s Scott Gibson and Christian Healion discuss the newCybersecurity and Infrastructure Security Agency (CISA) and how it can function as the public-private sector hub for understanding risk and helping the electric power industry achieve the twin goals of reliability and resiliency.

]]>The electric grid is often described as a lifeline sector for the nation’s critical infrastructure. But most of this sector is privately owned. How can the government and private sector work together to protect the nation’s critical infrastructure?

The Chertoff Group’s Scott Gibson and Christian Healion discuss the new Cybersecurity and Infrastructure Security Agency (CISA) and how it can function as the public-private sector hub for understanding risk and helping the electric power industry achieve the twin goals of reliability and resiliency.

]]>28:16cleanThe electric grid is often described as a lifeline sector for the nation’s critical infrastructure. But most of it is privately owned. How can the government and private sector work together to protect the nation’s critical infrastructure?
The Chertoff Group’s Scott Gibson and Christian Healion discuss CISA and how it can function as the public-private sector hub for understanding risk and helping the electric power industry achieve the twin goals of reliability and resiliency.49full048 Balancing Encryption and Safety Balancing Encryption and Safety Mon, 15 Jul 2019 04:00:00 +0000Encryption is a foundational security tool. But in a time of more outbreaks of violence, the temptation is great to build a backdoor into the encryption process and foil plots before they can be carried out. Chertoff Group Co-Founder and Executive Chairman Michael Chertoff argues that we shouldn’t weaken encryption for an understandable – yet narrow – law enforcement use. He discusses the techniques that law enforcement can use to make sense of data without undermining encryption and predicts that quantum computing will be the next big tool for cracking encryption.]]>Encryption is a foundational security tool. But in a time of more outbreaks of violence, the temptation is great to build a backdoor into the encryption process and foil plots before they can be carried out. Chertoff Group Co-Founder and Executive Chairman Michael Chertoff argues that we shouldn’t weaken encryption for an understandable – yet narrow – law enforcement use. He discusses the techniques that law enforcement can use to make sense of data without undermining encryption and predicts that quantum computing will be the next big tool for cracking encryption.]]>15:22cleanEncryption is a foundational security tool. But in a time of more outbreaks of violence, the temptation is great to build a backdoor into the encryption process and foil plots before they can be carried out. Chertoff Group Co-Founder and Executive Chairman Michael Chertoff argues that we shouldn’t weaken encryption for an understandable – yet narrow – law enforcement use. He discusses the techniques that law enforcement can use to make sense of data without undermining encryption.48full047 Keeping the Pedal to the Metal on Security Clearance TransformationKeeping the Pedal to the Metal on Security Clearance TransformationMon, 08 Jul 2019 04:00:00 +0000Under a new Executive Order, the security clearance process will now be conducted through the Department of Defense. It’s an important step forward in reforming the outmoded and cumbersome security clearance process. But it’s not a panacea say Chertoff Group Principal Charles Allen, Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Adam Lurie, a member of INSA’s advisory board. They argue that we must redefine what a clear and trusted worker is through a process of continuous evaluation and vetting. And we need to use technology to conduct security clearances in a way that’s much more effective and efficient than it’s done today.]]>Under a new Executive Order, the security clearance process will now be conducted through the Department of Defense. It’s an important step forward in reforming the outmoded and cumbersome security clearance process. But it’s not a panacea say Chertoff Group Principal Charles Allen, Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Adam Lurie, a member of INSA’s advisory board. They argue that we must redefine what a clear and trusted worker is through a process of continuous evaluation and vetting. And we need to use technology to conduct security clearances in a way that’s much more effective and efficient than it’s done today.]]>30:41cleanUnder a new Executive Order, the security clearance process will now be conducted through the DoD. It’s an important step forward in reforming the security clearance process. But it’s not a panacea say Chertoff Group Principal Charles Allen, Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Adam Lurie, a member of INSA’s advisory board. They argue that we must redefine what a clear and trusted worker is through a process of continuous evaluation and vetting. 47full046 The Cyber SAFETY ActThe Cyber SAFETY ActMon, 01 Jul 2019 04:00:00 +0000Cyber threats now rank as the number one threat against U.S. government and business interests. What can the government do to protect businesses against an onslaught of attacks? The Chertoff Group’s Adam Isles and Matthew Eggers of the U.S. Chamber of Commerce discuss the Cyber SAFETY Act – proposed legislation that would modernize an early law put into place after 9/11 to encourage the use of anti-terrorism technology. The legislation, among other things, incentivizes companies to take their product through the Department of Homeland Security’s SAFETY Act vetting process.]]>Cyber threats now rank as the number one threat against U.S. government and business interests. What can the government do to protect businesses against an onslaught of attacks? The Chertoff Group’s Adam Isles and Matthew Eggers of the U.S. Chamber of Commerce discuss the Cyber SAFETY Act – proposed legislation that would modernize an early law put into place after 9/11 to encourage the use of anti-terrorism technology. The legislation, among other things, incentivizes companies to take their product through the Department of Homeland Security’s SAFETY Act vetting process.]]>23:25cleanCyber threats now rank as the number one threat against U.S. government and business interests. The Chertoff Group’s Adam Isles and Matthew Eggers of the U.S. Chamber of Commerce discuss the Cyber SAFETY Act – proposed legislation that would modernize an early law put into place after 9/11 to encourage the use of anti-terrorism technology. The legislation, among other things, incentivizes companies to take their product through the Department of Homeland Security’s SAFETY Act vetting process.46full045 The Weakest Link? Managing Third-Party RiskThe Weakest Link? Managing Third-Party RiskMon, 24 Jun 2019 04:00:00 +0000A changing business environment has meant that many companies outsource services and have multiple supply chains, introducing new risks from the outside. The Chertoff Group’sChris Duvalltalks about ways to manage third-party risk, the questions companies should be asking, and the looming threat of software subversion. He advises organizations to have a robust third-party program as part of any holistic risk-management strategy.]]>A changing business environment has meant that many companies outsource services and have multiple supply chains, introducing new risks from the outside. The Chertoff Group’s Chris Duvall talks about ways to manage third-party risk, the questions companies should be asking, and the looming threat of software subversion. He advises organizations to have a robust third-party program as part of any holistic risk-management strategy.]]>11:54cleanA changing business environment has meant that many companies outsource services and have multiple supply chains, introducing new risks from the outside. The Chertoff Group’s Chris Duvall talks about ways to manage third-party risk, the questions companies should be asking, and the looming threat of software subversion. He advises organizations to have a robust third-party program as part of any holistic risk-management strategy. 45full044 An Offense Informed DefenseAn Offense Informed DefenseMon, 17 Jun 2019 04:00:00 +0000Organizations are facing increased cybersecurity threats. How should companies assess these risks and put a plan in place to prevent them? The Chertoff Group’sAdam IslesandKurt Alaybeyogludiscuss MITRE’s ATT&CK threat assessment model that helps companies create individual plans to better understand risks, threats and ways to guard against them.]]>Organizations are facing increased cybersecurity threats. How should companies assess these risks and put a plan in place to prevent them? The Chertoff Group’s Adam Isles and Kurt Alaybeyoglu discuss MITRE’s ATT&CK threat assessment model that helps companies create individual plans to better understand risks, threats and ways to guard against them.]]>21:27cleanOrganizations are facing increased cybersecurity threats. How should companies assess these risks and put a plan in place to prevent them? The Chertoff Group’s Adam Isles and Kurt Alaybeyoglu discuss MITRE’s ATT&CK threat assessment model that helps companies create individual plans to better understand risks, threats and ways to guard against them. 44full043 Security Risk Management: Are Businesses Making the Right Investments?Security Risk Management: Are Businesses Making the Right Investments?Mon, 10 Jun 2019 04:00:00 +0000There’s no such thing as risk elimination. But if businesses focus on the most likely threats, they can minimize the damage. The Chertoff Group’sAdam IslesandScott Gibsontalk about how organizations can manage security risks effectively, the importance of monitoring those risks, and the convergence of both physical and cybersecurity threats.]]>There’s no such thing as risk elimination. But if businesses focus on the most likely threats, they can minimize the damage. The Chertoff Group’s Adam Isles and Scott Gibson talk about how organizations can manage security risks effectively, the importance of monitoring those risks, and the convergence of both physical and cybersecurity threats.]]>19:33cleanThere’s no such thing as risk elimination. But if businesses focus on the most likely threats, they can minimize the damage. The Chertoff Group’s Adam Isles and Scott Gibson talk about how organizations can manage security risks effectively, the importance of monitoring those risks, and the convergence of both physical and cybersecurity threats. 43full042 Global ThreatsGlobal ThreatsMon, 03 Jun 2019 04:00:00 +0000A brief note to our listeners: Our “Global Threats” podcast was originally recorded on May 3, 2019. Since that time, additional events have occurred involving the regions we discuss on the podcast.

Geopolitical realities can present risks for companies. The Chertoff Group’sJonathan Paris, an expert inMiddle East, US-China and transatlantic relations,provides regional insights and outlines the risks that Iran poses.What should global companies anticipate in the region?

]]>A brief note to our listeners: Our “Global Threats” podcast was originally recorded on May 3, 2019. Since that time, additional events have occurred involving the regions we discuss on the podcast.

Geopolitical realities can present risks for companies. The Chertoff Group’s Jonathan Paris, an expert in Middle East, US-China and transatlantic relations, provides regional insights and outlines the risks that Iran poses. What should global companies anticipate in the region?

]]>18:37cleanA brief note to our listeners: Our “Global Threats” podcast was originally recorded on May 3, 2019. Since that time, additional events have occurred involving the regions we discuss on the podcast.
Geopolitical realities can present risks for companies. The Chertoff Group’s Jonathan Paris, an expert in Middle East, US-China and transatlantic relations, provides regional insights and outlines the risks that Iran poses. What should global companies anticipate in the region?42full042 Adding AI to Security Clearances Adding AI to Security Clearances Mon, 27 May 2019 04:00:00 +0000How can technology play a role in modernizing the security clearance process?Allan Martin, co-founder and CEO of Lumina Analytics, speaks about how we move from an outmoded system that is manually based to one that is far more focused on technology. He discusses how the use of artificial intelligence could make the process more efficient and why continuous evaluation is needed in the security clearance process.]]>How can technology play a role in modernizing the security clearance process? Allan Martin, co-founder and CEO of Lumina Analytics, speaks about how we move from an outmoded system that is manually based to one that is far more focused on technology. He discusses how the use of artificial intelligence could make the process more efficient and why continuous evaluation is needed in the security clearance process.]]>18:08cleanHow can technology play a role in modernizing the security clearance process? Allan Martin, co-founder and CEO of Lumina Analytics, speaks about how we move from an outmoded system that is manually based to one that is far more focused on technology. He discusses how the use of artificial intelligence could make the process more efficient and why continuous evaluation is needed in the security clearance process. 42full041 An Evolution for PrivacyAn Evolution for PrivacyMon, 20 May 2019 04:00:00 +0000Private companies are collecting an enormous amount of data about us. What’s being collected, who is sharing it, and why? Privacy expertJustin Antonipillai, CEO of WireWheel, talks about the data that online retailers are collecting and buying about customers and how this information can be used. He discusses the steps that companies should take when it comes to privacy.]]>Private companies are collecting an enormous amount of data about us. What’s being collected, who is sharing it, and why? Privacy expert Justin Antonipillai, CEO of WireWheel, talks about the data that online retailers are collecting and buying about customers and how this information can be used. He discusses the steps that companies should take when it comes to privacy.]]>23:56cleanPrivate companies are collecting an enormous amount of data about us. What’s being collected, who is sharing it, and why? Privacy expert Justin Antonipillai, CEO of WireWheel, talks about the data that online retailers are collecting and buying about customers and how this information can be used. He discusses the steps that companies should take when it comes to privacy. 41full040 Protecting the Nation’s Critical Infrastructure Protecting the Nation’s Critical Infrastructure Mon, 13 May 2019 04:00:00 +0000How can we protect the nation’s critical infrastructure from both physical and cyber attacks?Brian Harrell, the first Assistant Director for Infrastructure Security within the U.S. Cybersecurity and Infrastructure Security Agency (CISA), discusses how “soft” targets – from schools to stadiums and places of worship – can be protected. He talks about the convergence of physical and cyber security, the role of the government and private sector in protecting infrastructure, and how building resilience can help us avoid a single point of failure.]]>How can we protect the nation’s critical infrastructure from both physical and cyber attacks? Brian Harrell, the first Assistant Director for Infrastructure Security within the U.S. Cybersecurity and Infrastructure Security Agency (CISA), discusses how “soft” targets – from schools to stadiums and places of worship – can be protected. He talks about the convergence of physical and cyber security, the role of the government and private sector in protecting infrastructure, and how building resilience can help us avoid a single point of failure.]]>20:50cleanHow can we protect the nation’s critical infrastructure from both physical and cyber attacks? Brian Harrell, the first Assistant Director for Infrastructure Security within the U.S. Cybersecurity and Infrastructure Security Agency (CISA), discusses how “soft” targets can be protected. He talks about the convergence of physical and cyber security, the role of the government and private sector in protecting infrastructure, and how building resilience can help us avoid a single point of failure.
40full039 A Quantum Leap Forward A Quantum Leap Forward Mon, 06 May 2019 04:00:00 +0000What is quantum computing and how might this disruptive technology change our lives?Paul Stimers, a partner at the law firm K&L Gates and founder of the Quantum Industry Coalition, talks about how the U.S. can encourage innovation in the field – or risk losing out to international competitors. He notes the importance that workforce development will play in the field. With the right investments, he believes the U.S. is capable of winning the quantum race.]]>What is quantum computing and how might this disruptive technology change our lives? Paul Stimers, a partner at the law firm K&L Gates and founder of the Quantum Industry Coalition, talks about how the U.S. can encourage innovation in the field – or risk losing out to international competitors. He notes the importance that workforce development will play in the field. With the right investments, he believes the U.S. is capable of winning the quantum race.]]>13:59cleanWhat is quantum computing and how might this disruptive technology change our lives? Paul Stimers, a partner at the law firm K&L Gates and founder of the Quantum Industry Coalition, talks about how the U.S. can encourage innovation in the field – or risk losing out to international competitors. He notes the importance that workforce development will play in the field. With the right investments, he believes the U.S. is capable of winning the quantum race. 39full038 Beyond Big Brother: Dealing with Insider RisksBeyond Big Brother: Dealing with Insider RisksMon, 29 Apr 2019 04:00:00 +0000Sometimes, the greatest risks to a company come from the inside. The Chertoff Group’sLee KairandSean Hornerdiscuss insider risk, why it happens and what can be done to identify and mitigate those risks. They stress the importance of continually monitoring behaviors that can indicate a red flag. And they offer insights on how a robust insider threat program can help all employees and help identify threats before problems arise.]]>Sometimes, the greatest risks to a company come from the inside. The Chertoff Group’s Lee Kair and Sean Horner discuss insider risk, why it happens and what can be done to identify and mitigate those risks. They stress the importance of continually monitoring behaviors that can indicate a red flag. And they offer insights on how a robust insider threat program can help all employees and help identify threats before problems arise.]]>21:35cleanSometimes, the greatest risks to a company come from the inside. The Chertoff Group’s Lee Kair and Sean Horner discuss insider risk, why it happens and what can be done to identify and mitigate those risks. They stress the importance of continually monitoring behaviors that can indicate a red flag. And they offer insights on how a robust insider threat program can help all employees and help identify threats before problems arise. 38full037 Are We Leading the 5G Race?Are We Leading the 5G Race?Mon, 22 Apr 2019 04:00:00 +0000The impending shift to Fifth Generation Wireless - 5G – will dramatically reshape almost all aspects of our lives. Its effects will impact all industries and it’s expected to herald unprecedented innovation.

Cyber security experts Sam Visner and John Nagengast, members of the Intelligence and National Security Alliance’s Cyber Council, discuss how 5G is different from previous networks, its applications and whether the United States is on pace in the race to 5G implementation. The economy and many aspects of our lives will depend on 5G capabilities. What are the risks involved and how do we keep 5G networks secure?

]]>The impending shift to Fifth Generation Wireless - 5G – will dramatically reshape almost all aspects of our lives. Its effects will impact all industries and it’s expected to herald unprecedented innovation.

Cyber security experts Sam Visner and John Nagengast, members of the Intelligence and National Security Alliance’s Cyber Council, discuss how 5G is different from previous networks, its applications and whether the United States is on pace in the race to 5G implementation. The economy and many aspects of our lives will depend on 5G capabilities. What are the risks involved and how do we keep 5G networks secure?

]]>40:58cleanThe impending shift to Fifth Generation Wireless - 5G – will dramatically reshape almost all aspects of our lives. Its effects will impact all industries and it’s expected to herald unprecedented innovation. Cyber security experts Sam Visner and John Nagengast discuss how 5G is different from previous networks, its applications and whether the United States is on pace in the race to 5G implementation. The economy and many aspects of our lives will depend on 5G capabilities. 37full036 Inside the Tactical Advances between Cybercriminals and Security IndustryInside the Tactical Advances between Cybercriminals and Security IndustryMon, 15 Apr 2019 04:00:00 +0000Cybercriminals are escalating the cyber arms race with pace and determination. Cybersecurity expert Bill Conner, president and CEO of SonicWall, helps us explore the tactical advances by both the security industry and cybercriminals. Conner discusses the 2018 SonicWall Cyber Threat Report, which details more than 10.5 billion global malware attacks and spikes in ransomware, phishing, IoT threats and sophisticated salvos over non-standard ports. What can be learned about protecting against these threats and how can the public and private sectors work together to prevent them? Join us.]]>Cybercriminals are escalating the cyber arms race with pace and determination. Cybersecurity expert Bill Conner, president and CEO of SonicWall, helps us explore the tactical advances by both the security industry and cybercriminals. Conner discusses the 2018 SonicWall Cyber Threat Report, which details more than 10.5 billion global malware attacks and spikes in ransomware, phishing, IoT threats and sophisticated salvos over non-standard ports. What can be learned about protecting against these threats and how can the public and private sectors work together to prevent them? Join us.]]>25:22cleanCybersecurity expert Bill Conner helps us explore the tactical advances by both the security industry and cybercriminals. He discusses the 2018 SonicWall Cyber Threat Report, which details more than 10.5 billion global malware attacks and spikes in ransomware, phishing, IoT threats and sophisticated salvos over non-standard ports. What can be learned about protecting against these threats and how can the public and private sectors work together to prevent them? Join us.36full035 A Common Language for CyberA Common Language for CyberMon, 08 Apr 2019 04:00:00 +0000A common language is needed around cyber threats, saysJim Richberg, former National Intelligence Manager for Cyber and advisor to the Director of National Intelligence on cyber issues. He talks about how to turn cyber intelligence into actionable information. Lacking good metrics is the “greatest Achilles’ heel of cybersecurity,” he says. He cautions that while artificial intelligence and machine learning generate a lot of buzz, we have yet to understand the technology’s full potential.]]>A common language is needed around cyber threats, says Jim Richberg, former National Intelligence Manager for Cyber and advisor to the Director of National Intelligence on cyber issues. He talks about how to turn cyber intelligence into actionable information. Lacking good metrics is the “greatest Achilles’ heel of cybersecurity,” he says. He cautions that while artificial intelligence and machine learning generate a lot of buzz, we have yet to understand the technology’s full potential.]]>37:40cleanA common language is needed around cyber threats, says Jim Richberg, former National Intelligence Manager for Cyber and advisor to the Director of National Intelligence on cyber issues. He talks about how to turn cyber intelligence into actionable information. Lacking good metrics is the “greatest Achilles’ heel of cybersecurity,” he says. He cautions that while artificial intelligence and machine learning generate a lot of buzz, we have yet to understand the technology’s full potential. 35full034 When the Threats are ConnectedWhen the Threats are ConnectedMon, 01 Apr 2019 04:00:00 +0000Our devices are increasingly connected through the Internet of Things (IoT). What are the emerging risks associated with this connectivity? Adam Isles, a principal at The Chertoff Group, shares insights about the IoT environment and the need for standards in this space. He calls for security standards to be seamlessly integrated into the software development lifecycle. ]]>Our devices are increasingly connected through the Internet of Things (IoT). What are the emerging risks associated with this connectivity? Adam Isles, a principal at The Chertoff Group, shares insights about the IoT environment and the need for standards in this space. He calls for security standards to be seamlessly integrated into the software development lifecycle. ]]>21:02cleanOur devices are increasingly connected through the Internet of Things (IoT). What are the emerging risks associated with this connectivity? Adam Isles, a principal at The Chertoff Group, shares insights about the IoT environment and the need for standards in this space. He calls for security standards to be seamlessly integrated into the software development lifecycle. 34full033 Making Blockchain and Cryptocurrency Less CrypticMaking Blockchain and Cryptocurrency Less CrypticMon, 25 Mar 2019 04:00:00 +0000What is blockchain technology and how is it applied?Alan Cohn, a blockchain and cryptocurrency expert with Steptoe, explains the ins and outs of blockchain, its strengths as a security technology, and the landscape for oversight and regulation. He discusses blockchain’s potential and how companies are using it to innovate.]]>What is blockchain technology and how is it applied? Alan Cohn, a blockchain and cryptocurrency expert with Steptoe, explains the ins and outs of blockchain, its strengths as a security technology, and the landscape for oversight and regulation. He discusses blockchain’s potential and how companies are using it to innovate.]]>28:18cleanWhat is blockchain technology and how is it applied? Alan Cohn, a blockchain and cryptocurrency expert with Steptoe, explains the ins and outs of blockchain, its strengths as a security technology, and the landscape for oversight and regulation. He discusses blockchain’s potential and how companies are using it to innovate.33full032 A Geneva Convention for Cyberspace?A Geneva Convention for Cyberspace?Mon, 18 Mar 2019 04:00:00 +0000Which laws govern data in cyberspace and how do these issues evolve when conflicts happen?Chris Painter, a globally recognized leader in cybersecurity and cyber policy, discusses how governments can work together to drive good behavior online and set norms. Although we’re not yet at a stage where we have a United Nations treaty for cyberspace, Painter calls for more international cooperation between governments and the private sector. And he warns that there must be accountability for countries that break the rules.]]>Which laws govern data in cyberspace and how do these issues evolve when conflicts happen? Chris Painter, a globally recognized leader in cybersecurity and cyber policy, discusses how governments can work together to drive good behavior online and set norms. Although we’re not yet at a stage where we have a United Nations treaty for cyberspace, Painter calls for more international cooperation between governments and the private sector. And he warns that there must be accountability for countries that break the rules.]]>17:00cleanWhich laws govern data in cyberspace and how do these issues evolve in conflict? Chris Painter, a globally recognized leader in cybersecurity and cyber policy, discusses how governments can work together to drive good behavior online and set norms. Though we’re not yet at a stage where we have a UN treaty for cyberspace, Painter calls for more international cooperation between governments and the private sector. And he warns that there must be accountability for countries that break the rules. 32full031 A To-Do For Due DiligenceA To-Do For Due DiligenceMon, 11 Mar 2019 04:00:00 +0000Reputational hits can cost a company and damage a business. What’s the role of business intelligence and due diligence when it comes to mitigating risk? The Chertoff Group’sBen JoelsonandBrogan Ingstaddiscuss the evolution of how companies have managed risk and the steps that should be taken – from mining open-source intelligence sources to navigating the Dark Web – to avoid reputational damage.]]>Reputational hits can cost a company and damage a business. What’s the role of business intelligence and due diligence when it comes to mitigating risk? The Chertoff Group’s Ben Joelson and Brogan Ingstad discuss the evolution of how companies have managed risk and the steps that should be taken – from mining open-source intelligence sources to navigating the Dark Web – to avoid reputational damage.]]>21:13cleanReputational hits can cost a company and damage a business. What’s the role of business intelligence and due diligence when it comes to mitigating risk? The Chertoff Group’s Ben Joelson and Brogan Ingstad discuss the evolution of how companies have managed risk and the steps that should be taken – from mining open-source intelligence sources to navigating the Dark Web – to avoid reputational damage.31full030 Preparing for Cyber-Enabled Economic WarfarePreparing for Cyber-Enabled Economic WarfareMon, 04 Mar 2019 05:00:00 +0000A cyber-enabled economic warfare (CEEW) attack designed to undermine America’s strength would have far-reaching strategic and economic consequences. Should such an attack occur, how would the U.S. government and private sector respond and what would they ask and expect of each other in the immediate aftermath? Dr. Samantha Ravich, chairman of the Foundation for Defense of Democracies’ Center on Cyber and Technology Innovation andDavid London, a senior director at The Chertoff Group, discuss what happened when senior leaders from the public and private sector came together to plan for such a scenario. They highlight the inter-dependencies in our economy and how we can work together to build resilience.]]>A cyber-enabled economic warfare (CEEW) attack designed to undermine America’s strength would have far-reaching strategic and economic consequences. Should such an attack occur, how would the U.S. government and private sector respond and what would they ask and expect of each other in the immediate aftermath? Dr. Samantha Ravich, chairman of the Foundation for Defense of Democracies’ Center on Cyber and Technology Innovation and David London, a senior director at The Chertoff Group, discuss what happened when senior leaders from the public and private sector came together to plan for such a scenario. They highlight the inter-dependencies in our economy and how we can work together to build resilience.]]>21:11cleanA cyber-enabled economic warfare attack designed to undermine America’s strength would have far-reaching consequences. How would the government and the private sector respond and interact? Dr. Samantha Ravich, chairman of FDD's CCTI and David London, a senior director at The Chertoff Group, discuss how representatives from the public and private sector came together to plan for such a scenario. They highlight the inter-dependencies in our economy and how we can work together to build resilience.30full029 Emerging Trends for Physical SecurityEmerging Trends for Physical SecurityMon, 25 Feb 2019 05:00:00 +0000We often focus on cybersecurity, but physical security is just as important. How do companies take the lessons learned from organizations that have experienced tragedies and implement them to keep employees safe? The Chertoff Group’sBen JoelsonandScott Gibsondiscuss technologies that could be part of the solution, and what happens when physical security and cybersecurity merge.]]>We often focus on cybersecurity, but physical security is just as important. How do companies take the lessons learned from organizations that have experienced tragedies and implement them to keep employees safe? The Chertoff Group’s Ben Joelson and Scott Gibson discuss technologies that could be part of the solution, and what happens when physical security and cybersecurity merge.]]>26:36cleanWe often focus on cybersecurity, but physical security is just as important. How do companies take the lessons learned from organizations that have experienced tragedies and implement them to keep employees safe? The Chertoff Group’s Ben Joelson and Scott Gibson discuss technologies that could be part of the solution, and what happens when physical security and cybersecurity merge.29full028 Playbook for a CrisisPlaybook for a CrisisMon, 18 Feb 2019 05:00:00 +0000What happens in the first 24 hours after an organization experiences a crisis?Siobhan Gorman, a partner at the Brunswick Group, talks about the playbook that every organization should have in place before an incident occurs. She discusses the implications for both internal and external communications, how to involve the CEO, and the role of social media in these situations.]]>What happens in the first 24 hours after an organization experiences a crisis? Siobhan Gorman, a partner at the Brunswick Group, talks about the playbook that every organization should have in place before an incident occurs. She discusses the implications for both internal and external communications, how to involve the CEO, and the role of social media in these situations.]]>18:04cleanWhat happens in the first 24 hours after an organization experiences a crisis? Siobhan Gorman, a partner at the Brunswick Group, talks about the playbook that every organization should have in place before an incident occurs. She discusses the implications for both internal and external communications, how to involve the CEO, and the role of social media in these situations.28full027 Not-So-Friendly Skies: Protecting Against Drone ThreatsNot-So-Friendly Skies: Protecting Against Drone ThreatsMon, 11 Feb 2019 05:00:00 +0000Drones have become ubiquitous for a number of commercial and consumer purposes. But what happens when drones land in the wrong hands? The Chertoff Group’s Ben Joelson and Phil Pitsky Vice President of Federal Operations for airspace security company Dedrone discuss the challenges and threats that drones can pose and what can be done under current law to protect from potential risks.]]>Drones have become ubiquitous for a number of commercial and consumer purposes. But what happens when drones land in the wrong hands? The Chertoff Group’s Ben Joelson and Phil Pitsky Vice President of Federal Operations for airspace security company Dedrone discuss the challenges and threats that drones can pose and what can be done under current law to protect from potential risks.]]>27:04cleanDrones have become ubiquitous for a number of commercial and consumer purposes. But what happens when drones land in the wrong hands? The Chertoff Group’s Ben Joelson and Phil Pitsky Vice President of Federal Operations for airspace security company Dedrone discuss the challenges and threats that drones can pose and what can be done under current law to protect from potential risks.27full026 Reforming the Security Clearance ProcessReforming the Security Clearance ProcessMon, 04 Feb 2019 05:00:00 +0000The current security clearance process is antiquated and should be modernized.Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Chertoff Group PrincipalCharles Allen, discuss the growing momentum to reform the security clearance process. They talk about how the government and private sector can work together on standards to build a trusted workforce. Both are optimistic that change will happen to overhaul the security clearance process.]]>The current security clearance process is antiquated and should be modernized. Chuck Alsup, President of the Intelligence and National Security Alliance (INSA), and Chertoff Group Principal Charles Allen, discuss the growing momentum to reform the security clearance process. They talk about how the government and private sector can work together on standards to build a trusted workforce. Both are optimistic that change will happen to overhaul the security clearance process.]]>26:07clean26full025 Cybersecurity: Why is This (Still) So Hard?Cybersecurity: Why is This (Still) So Hard?Mon, 28 Jan 2019 05:00:00 +0000As General Michael Hayden continues his recovery at home, please enjoy his recent thoughts on private and public sector approaches to cybersecurity and information sharing as part of our latest Insights &Intelligence podcast. He chats about some of the thorniest issues facing the United States, such as Russian interference in our elections, and how we’ll deter future attacks. Gen. Hayden urges his fellow Americans to get more involved in these discussions that will “shape the American approach to the world for the rest of the century."]]>As General Michael Hayden continues his recovery at home, please enjoy his recent thoughts on private and public sector approaches to cybersecurity and information sharing as part of our latest Insights & Intelligence podcast. He chats about some of the thorniest issues facing the United States, such as Russian interference in our elections, and how we’ll deter future attacks. Gen. Hayden urges his fellow Americans to get more involved in these discussions that will “shape the American approach to the world for the rest of the century."]]>28:43cleanAs General Michael Hayden continues his recovery at home, enjoy his recent thoughts on private and public sector approaches to cybersecurity and information sharing as part of our latest podcast. He chats about some of the thorniest issues facing the United States, such as Russian interference in our elections, and how to deter future attacks. Gen. Hayden urges fellow Americans to get more involved in these discussions that will “shape the American approach to the world for the rest of the century."25full024 How Can CEOs Reduce Risk?How Can CEOs Reduce Risk?Mon, 21 Jan 2019 05:00:00 +0000There are two types of companies – those that have experienced a #databreach and those that don’t know they have. As the amount of data breaches affecting the private sector has reached epidemic proportions, former FBI Executive Assistant Director Bob Anderson details the questions #CEOs should be asking to avoid an attack and what to do if a breach occurs. He discusses important steps companies should be taking to minimize #risks.]]>There are two types of companies – those that have experienced a #databreach and those that don’t know they have. As the amount of data breaches affecting the private sector has reached epidemic proportions, former FBI Executive Assistant Director Bob Anderson details the questions #CEOs should be asking to avoid an attack and what to do if a breach occurs. He discusses important steps companies should be taking to minimize #risks.]]>17:09cleanThere are two types of companies – those that have experienced a #databreach and those that don’t know they have. As the amount of data breaches affecting the private sector has reached epidemic proportions, former FBI Executive Assistant Director Bob Anderson details the questions #CEOs should be asking to avoid an attack and what to do if a breach occurs. He discusses important steps companies should be taking to minimize #risks.24full023 Securing Foreign Investment Gets a RebootSecuring Foreign Investment Gets a RebootMon, 14 Jan 2019 05:00:00 +0000Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the purpose of the Committee on Foreign Investment in the United States (CFIUS), how it works and how we can encourage foreign investment without compromising security. He highlights some changes in the law that every company doing business in the United States should know.]]>Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the purpose of the Committee on Foreign Investment in the United States (CFIUS), how it works and how we can encourage foreign investment without compromising security. He highlights some changes in the law that every company doing business in the United States should know.]]>27:48cleanChad Sweet, co-founder and CEO of The Chertoff Group, discusses the purpose of the Committee on Foreign Investment in the United States (CFIUS), how it works and how we can encourage foreign investment without compromising security. He highlights some changes in the law that every company doing business in the United States should know.23fullKaty Montgomery022 Soft Targets, Real ThreatsSoft Targets, Real ThreatsMon, 07 Jan 2019 05:00:00 +0000When it comes to terrorist attacks, some of the biggest threats to security involve soft targets – airports, concert venues and nightclubs.Dr. J. Bennet Waters, who leads The Chertoff Group’s global Strategic Advisory Services, discusses ways to manage risk, be aware of threats and balance security with privacy with civil liberties. Keeping ahead of what our adversaries are doing – and sharing that information in a way that’s actionable – is critical.]]>When it comes to terrorist attacks, some of the biggest threats to security involve soft targets – airports, concert venues and nightclubs. Dr. J. Bennet Waters, who leads The Chertoff Group’s global Strategic Advisory Services, discusses ways to manage risk, be aware of threats and balance security with privacy with civil liberties. Keeping ahead of what our adversaries are doing – and sharing that information in a way that’s actionable – is critical.]]>12:59cleanWhen it comes to terrorist attacks, some of the biggest threats to security involve soft targets – airports, concert venues and nightclubs. Dr. J. Bennet Waters, who leads The Chertoff Group’s global Strategic Advisory Services, discusses ways to manage risk, be aware of threats and balance security with privacy with civil liberties. Keeping ahead of what our adversaries are doing – and sharing that information in a way that’s actionable – is critical.22fullKaty Montgomery021 A Break for the HolidaysA Break for the HolidaysFri, 21 Dec 2018 05:00:00 +0000We’re on a break for the holidays, but look for more insights from the podcast when we return on January 7, 2019.]]>We’re on a break for the holidays, but look for more insights from the podcast when we return on January 7, 2019.]]>11cleanWe’re on a break for the holidays, but look for more insights from the podcast when we return on January 7, 2019.21fullKaty Montgomery020 Putting Security in the Driver’s SeatPutting Security in the Driver’s SeatMon, 17 Dec 2018 05:00:00 +0000How can security be embedded in the technologies used in automobiles?Fay Francy, executive director of theAutomotive Information Sharing and Analysis Center (Auto-ISAC), discusses how the auto industry is working together to make sure the software used in cars is safe and secure.]]>How can security be embedded in the technologies used in automobiles? Fay Francy, executive director of the Automotive Information Sharing and Analysis Center (Auto-ISAC), discusses how the auto industry is working together to make sure the software used in cars is safe and secure.]]>16:09cleanHow can security be embedded in the technologies used in automobiles? Fay Francy, executive director of the Automotive Information Sharing and Analysis Center (Auto-ISAC), discusses how the auto industry is working together to make sure the software used in cars is safe and secure.
20fullKaty Montgomery019 Software is Infecting the WorldSoftware is Infecting the WorldMon, 10 Dec 2018 05:00:00 +0000Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Josh's unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. He also serves as an adjunct faculty for Carnegie Mellon’s Heinz College and on the Congressional Task Force for Healthcare Industry Cybersecurity.

]]>Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Josh's unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. He also serves as an adjunct faculty for Carnegie Mellon’s Heinz College and on the Congressional Task Force for Healthcare Industry Cybersecurity.

]]>37:54cleanJoshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. 19fullKaty Montgomery 018 A Prescription for Security in Digital HealthA Prescription for Security in Digital HealthMon, 03 Dec 2018 05:00:00 +0000From insertable cardiac monitors to medical devices connected to smartphones, healthcare has become more responsive to patients. Abbott’s Chris Tyberg and Chertoff Group Principal Bennet Waters discuss technological advances in digital health and the role that cybersecurity plays in this new healthcare frontier. They share insights from a new study of physicians and hospital administrators on cybersecurity in the connected hospital and the need for collaboration to address current challenges.]]>From insertable cardiac monitors to medical devices connected to smartphones, healthcare has become more responsive to patients. Abbott’s Chris Tyberg and Chertoff Group Principal Bennet Waters discuss technological advances in digital health and the role that cybersecurity plays in this new healthcare frontier. They share insights from a new study of physicians and hospital administrators on cybersecurity in the connected hospital and the need for collaboration to address current challenges.]]>27:19cleanFrom insertable cardiac monitors to medical devices connected to smartphones, healthcare has become more responsive to patients. Abbott’s Chris Tyberg and Chertoff Group Principal Bennet Waters discuss technological advances in digital health and the role that cybersecurity plays in this new healthcare frontier. They share insights from a new study of physicians and hospital administrators on cybersecurity in the connected hospital and the need for collaboration to address current challenges.18fullKaty Montgomery017 Up in the Cloud: Keeping it Secure Up in the Cloud: Keeping it Secure Mon, 26 Nov 2018 05:00:00 +0000What do organizations need to know to effectively manage security when moving to the cloud? Delta Risk CEOScott Kainewalks us through important considerations such as identifying what you already have in the cloud, ensuring the environment is configured correctly, and determining who has access. He stresses the need to triage what’s important when it comes to securing the cloud. And he discusses the role that artificial intelligence and machine learning could play in the future.]]>What do organizations need to know to effectively manage security when moving to the cloud? Delta Risk CEO Scott Kaine walks us through important considerations such as identifying what you already have in the cloud, ensuring the environment is configured correctly, and determining who has access. He stresses the need to triage what’s important when it comes to securing the cloud. And he discusses the role that artificial intelligence and machine learning could play in the future.]]>25:04cleanWhat do organizations need to know to effectively manage security when moving to the cloud? Delta Risk CEO Scott Kaine walks us through important considerations such as identifying what you already have in the cloud, ensuring the environment is configured correctly, and determining who has access. He stresses the need to triage what’s important when it comes to securing the cloud. And he discusses the role that artificial intelligence and machine learning could play in the future.
17fullKaty Montgomery016 Are You Who You Say You Are?Are You Who You Say You Are?Mon, 19 Nov 2018 17:00:00 +0000While biometric technologies have been around for a long time, we’re now starting to see them in our day-to-day lives. From iris and fingerprint scans to facial recognition software,Lee Kair, managing director at The Chertoff Group, breaks down what we need to know about biometrics. Kair, an expert in aviation and transportation security, chats about how biometrics can be used to speed up travel processes while making them more secure. He argues that transparency will be critical as we balance the appropriate use of biometrics with privacy concerns.]]>While biometric technologies have been around for a long time, we’re now starting to see them in our day-to-day lives. From iris and fingerprint scans to facial recognition software, Lee Kair, managing director at The Chertoff Group, breaks down what we need to know about biometrics. Kair, an expert in aviation and transportation security, chats about how biometrics can be used to speed up travel processes while making them more secure. He argues that transparency will be critical as we balance the appropriate use of biometrics with privacy concerns.]]>25:54cleanWhile biometric technologies have been around for a long time, we’re now starting to see them in our day-to-day lives. From iris and fingerprint scans to facial recognition software, Lee Kair, managing director at The Chertoff Group, breaks down what we need to know about biometrics. Kair, an expert in aviation and transportation security, chats about how biometrics can be used to speed up travel processes while making them more secure.
16fullThe Chertoff Group015 Big Brother at the Door: Maintaining Control of Your DataBig Brother at the Door: Maintaining Control of Your DataMon, 12 Nov 2018 17:00:00 +0000The data revolution has made our lives more convenient, but it’s also created vulnerabilities. Former Secretary of the U.S. Department of Homeland Security and The Chertoff Group FounderMichael Chertoffdiscusses his new book, “Exploding Data: Reclaiming Our Cyber Security in the Digital Age.” The use of digital tools has allowed us to generate a lot more data and to analyze it, altering our perception about the lines between public and private information. Chertoff talks about how we can avoid living in a world of ubiquitous surveillance and the need for greater protection of our cyber infrastructure. Finally, he calls for updates to policy and legal frameworks to reflect our new reality.]]>The data revolution has made our lives more convenient, but it’s also created vulnerabilities. Former Secretary of the U.S. Department of Homeland Security and The Chertoff Group Founder Michael Chertoff discusses his new book, “Exploding Data: Reclaiming Our Cyber Security in the Digital Age.” The use of digital tools has allowed us to generate a lot more data and to analyze it, altering our perception about the lines between public and private information. Chertoff talks about how we can avoid living in a world of ubiquitous surveillance and the need for greater protection of our cyber infrastructure. Finally, he calls for updates to policy and legal frameworks to reflect our new reality.]]>21:12cleanThe data revolution has made our lives more convenient, but it’s also created vulnerabilities. Former Secretary of the U.S. Department of Homeland Security and The Chertoff Group Founder Michael Chertoff discusses his new book, “Exploding Data: Reclaiming Our Cyber Security in the Digital Age.” The use of digital tools has allowed us to generate a lot more data and to analyze it, altering our perception about the lines between public and private information.15fullThe Chertoff Group014 Weak Links: Managing Risks in the Technology Supply ChainWeak Links: Managing Risks in the Technology Supply ChainMon, 05 Nov 2018 17:00:00 +0000Constant software updates and changes to code can introduce new security vulnerabilities into the technology supply chain – the hardware, software, and services we use on a daily basis. Two cyber risk management experts from The Chertoff Group – David London and Adam Isles – discuss what happens when the technology supply chain is compromised, and the ripple effects given the interconnected nature of the technology. Meanwhile, the government is considering mandates and regulatory action to protect the technology supply chain. London and Isles offer insights into why companies need to manage these risks and how some sectors are working to do it. They caution that it’s a problem no company can solve alone.]]>Constant software updates and changes to code can introduce new security vulnerabilities into the technology supply chain – the hardware, software, and services we use on a daily basis. Two cyber risk management experts from The Chertoff Group – David London and Adam Isles – discuss what happens when the technology supply chain is compromised, and the ripple effects given the interconnected nature of the technology. Meanwhile, the government is considering mandates and regulatory action to protect the technology supply chain. London and Isles offer insights into why companies need to manage these risks and how some sectors are working to do it. They caution that it’s a problem no company can solve alone.]]>30:45cleanConstant software updates and changes to code can introduce new security vulnerabilities into the technology supply chain – the hardware, software, and services we use on a daily basis. Two cyber risk management experts from The Chertoff Group – David London and Adam Isles – discuss what happens when the technology supply chain is compromised, and the ripple effects given the interconnected nature of the technology.14fullThe Chertoff Group013 Cybersecurity: Art or Science?Cybersecurity: Art or Science?Mon, 29 Oct 2018 16:00:00 +0000The Internet of Things — from driverless vehicles to medical devices —presents new challenges to cybersecurity. Who is responsible when things go horribly awry? Chertoff Group Senior Advisor Paul Rosenzweig says a revolution in cyber liability is coming, whether the industry likes it or not. He warns that if the industry doesn’t participate in a standards-setting process, either legislatures or courts will do it for them. Rosenzweig discusses the privacy issues that are raised when our devices and cars collect information about us and he predicts an increasing convergence between privacy and security.]]>The Internet of Things — from driverless vehicles to medical devices —presents new challenges to cybersecurity. Who is responsible when things go horribly awry? Chertoff Group Senior Advisor Paul Rosenzweig says a revolution in cyber liability is coming, whether the industry likes it or not. He warns that if the industry doesn’t participate in a standards-setting process, either legislatures or courts will do it for them. Rosenzweig discusses the privacy issues that are raised when our devices and cars collect information about us and he predicts an increasing convergence between privacy and security.]]>31:41cleanThe Internet of Things — from driverless vehicles to medical devices —presents new challenges to cybersecurity. Who is responsible when things go horribly awry? Chertoff Group Senior Advisor Paul Rosenzweig says a revolution in cyber liability is coming, whether the industry likes it or not. He warns that if the industry doesn’t participate in a standards-setting process, either legislatures or courts will do it for them. 13fullThe Chertoff Group012 The Threats from WithinThe Threats from WithinMon, 22 Oct 2018 16:00:00 +0000When we think of insider cybersecurity threats to a business or government agency, we conjure images of spies working on behalf of a foreign government. But many insider threats are accidental, explains Bob Anderson, a principal in the Chertoff Group’s global Strategic Advisory Services. Anderson, who has been involved in investigating and arresting some of the most famous spies in U.S. history during his career with the FBI, breaks down the different categories of corporate threat — from the busy employee who inadvertently clicks on malware to those with more insidious aims. He offers insights on what makes a good insider threat program, why gaining employee trust is so difficult, and why corporate boards need to proactively examine their IT infrastructure and cybersecurity practices and procedures.]]>When we think of insider cybersecurity threats to a business or government agency, we conjure images of spies working on behalf of a foreign government. But many insider threats are accidental, explains Bob Anderson, a principal in the Chertoff Group’s global Strategic Advisory Services. Anderson, who has been involved in investigating and arresting some of the most famous spies in U.S. history during his career with the FBI, breaks down the different categories of corporate threat — from the busy employee who inadvertently clicks on malware to those with more insidious aims. He offers insights on what makes a good insider threat program, why gaining employee trust is so difficult, and why corporate boards need to proactively examine their IT infrastructure and cybersecurity practices and procedures.]]>20:00cleanWhen we think of insider cybersecurity threats to a business or government agency, we conjure images of spies working on behalf of a foreign government. But many insider threats are accidental, explains Bob Anderson, a principal in the Chertoff Group’s global Strategic Advisory Services. Anderson, who has been involved in investigating and arresting some of the most famous spies in U.S. history during his career with the FBI, breaks down the different categories of corporate threat.12full011 Securing the Election: Are We Ready for the Midterms?Securing the Election: Are We Ready for the Midterms?Mon, 15 Oct 2018 16:00:00 +0000Can we ensure our election security infrastructure is safe from attack? Ahead of the midterm elections, Chris Krebs, Under Secretary for the Department of Homeland Security’s National Protection and Programs Directorate, discusses the Elections Infrastructure Information Sharing and Analysis Center (ES-ISAC), which helps states and localities share information about cyberthreats. He warns that influence operations are just as formidable a threat to our elections as infrastructure risks.]]>Can we ensure our election security infrastructure is safe from attack? Ahead of the midterm elections, Chris Krebs, Under Secretary for the Department of Homeland Security’s National Protection and Programs Directorate, discusses the Elections Infrastructure Information Sharing and Analysis Center (ES-ISAC), which helps states and localities share information about cyberthreats. He warns that influence operations are just as formidable a threat to our elections as infrastructure risks.]]>31:55cleanCan we ensure our election security infrastructure is safe from attack? Ahead of the midterm elections, Chris Krebs, Under Secretary for the Department of Homeland Security’s National Protection and Programs Directorate, discusses the Elections Infrastructure Information Sharing and Analysis Center (ES-ISAC), which helps states and localities share information about cyberthreats. He warns that influence operations are just as formidable a threat to our elections as infrastructure risks.11full010 The Information Wedge: Combating Disinformation in the Age of Social MediaThe Information Wedge: Combating Disinformation in the Age of Social MediaMon, 08 Oct 2018 16:00:00 +0000While disinformation campaigns are nothing new, the ability to spread false narratives has gained new life with the use of social media. Justin Maddox, a counter-propaganda expert who specializes in emerging technology applications, talks about Russian attempts to sow discord in our politics and manipulate investments in the energy sector. The bad news? We’re falling for it. Maddox offers insights on what we can do to prepare for such attacks — wherever they come from — and why crisis communications plans are a critical part of the response.]]>While disinformation campaigns are nothing new, the ability to spread false narratives has gained new life with the use of social media. Justin Maddox, a counter-propaganda expert who specializes in emerging technology applications, talks about Russian attempts to sow discord in our politics and manipulate investments in the energy sector. The bad news? We’re falling for it. Maddox offers insights on what we can do to prepare for such attacks — wherever they come from — and why crisis communications plans are a critical part of the response.]]>32:01cleanWhile disinformation campaigns are nothing new, the ability to spread false narratives has gained new life with the use of social media. Justin Maddox, a counter-propaganda expert who specializes in emerging technology applications, talks about Russian attempts to sow discord in our politics and manipulate investments in the energy sector. The bad news? We’re falling for it. Maddox offers insights on what we can do to prepare for such attacks.10full009 Stakes Are High: The Challenge of Navigating Foreign InvestmentStakes Are High: The Challenge of Navigating Foreign InvestmentMon, 01 Oct 2018 16:00:00 +0000New legislation seeks to modernize the process by which foreign companies invest in the United States. What will this mean for companies looking to do business in the U.S.? Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the ins and outs of the Committee on Foreign Investment in the United States (CFIUS) and how companies can navigate the process. He talks about cases where foreign investors have stumbled in the process, why having a CFIUS advisor every step of the way is so crucial, and what the new legislation could mean.]]>New legislation seeks to modernize the process by which foreign companies invest in the United States. What will this mean for companies looking to do business in the U.S.? Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the ins and outs of the Committee on Foreign Investment in the United States (CFIUS) and how companies can navigate the process. He talks about cases where foreign investors have stumbled in the process, why having a CFIUS advisor every step of the way is so crucial, and what the new legislation could mean.]]>37:49cleanNew legislation seeks to modernize the process by which foreign companies invest in the United States. What will this mean for companies looking to do business in the U.S.? Chad Sweet, co-founder and CEO of The Chertoff Group, discusses the ins and outs of the Committee on Foreign Investment in the United States (CFIUS) and how companies can navigate the process. He talks about cases where foreign investors have stumbled in the process, why having a CFIUS advisor every step of the way is so crucial.9full008 Risky Business: How to Manage When Threats EvolveRisky Business: How to Manage When Threats EvolveMon, 24 Sep 2018 16:00:00 +0000Security threats are constantly changing. And while you can’t completely eliminate risk, you can learn to manage it. Adam Isles, a principal at The Chertoff Group, helps clients evaluate and mature their security risk management programs. He discusses steps to creating a sound risk management program, and how companies can assess, mitigate, and monitor threats. And he gets us thinking about what to do when the threats come from the inside.]]>Security threats are constantly changing. And while you can’t completely eliminate risk, you can learn to manage it. Adam Isles, a principal at The Chertoff Group, helps clients evaluate and mature their security risk management programs. He discusses steps to creating a sound risk management program, and how companies can assess, mitigate, and monitor threats. And he gets us thinking about what to do when the threats come from the inside.]]>30:28cleanSecurity threats are constantly changing. And while you can’t completely eliminate risk, you can learn to manage it. Adam Isles, a principal at The Chertoff Group, helps clients evaluate and mature their security risk management programs. He discusses steps to creating a sound risk management program, and how companies can assess, mitigate, and monitor threats. And he gets us thinking about what to do when the threats come from the inside.8fullThe Chertoff Group007 Are You Ransomware Ready? Tips for Fighting BackAre You Ransomware Ready? Tips for Fighting BackMon, 17 Sep 2018 16:00:00 +0000From the infamous WannaCry to NotPetya, ransomware is a big business and has become the single most prevalent form of malware. Chris Duvall, senior director at The Chertoff Group and expert on security and risk management, discusses how ransomware spreads, how to prepare for a potential attack, and how to recover. Duvall offers insights about how organizations can respond and why having an independent evaluation of your security program can help prevent a disaster down the line.]]>From the infamous WannaCry to NotPetya, ransomware is a big business and has become the single most prevalent form of malware. Chris Duvall, senior director at The Chertoff Group and expert on security and risk management, discusses how ransomware spreads, how to prepare for a potential attack, and how to recover. Duvall offers insights about how organizations can respond and why having an independent evaluation of your security program can help prevent a disaster down the line.]]>30:35cleanFrom the infamous WannaCry to NotPetya, ransomware is a big business and has become the single most prevalent form of malware. Chris Duvall, senior director at The Chertoff Group and expert on security and risk management, discusses how ransomware spreads, how to prepare for a potential attack, and how to recover. Duvall offers insights about how organizations can respond and why having an independent evaluation of your security program can help prevent a disaster down the line.7fullThe Chertoff Group006 Securing the Homeland – What Can Small Business Offer?Securing the Homeland – What Can Small Business Offer?Mon, 10 Sep 2018 16:00:00 +0000Government partners need the best solutions today to respond to threats in a constantly changing environment.Kristina Tanasichuk, CEO of the Government Technology & Services Coalition and founder of Women in Homeland Security, talks about what small and medium-sized businesses can offer their government partners. She discusses the business of homeland security and the challenges of operating in a “post-truth” environment.]]>Government partners need the best solutions today to respond to threats in a constantly changing environment. Kristina Tanasichuk, CEO of the Government Technology & Services Coalition and founder of Women in Homeland Security, talks about what small and medium-sized businesses can offer their government partners. She discusses the business of homeland security and the challenges of operating in a “post-truth” environment.]]>22:18cleanGovernment partners need the best solutions today to respond to threats in a constantly changing environment. Kristina Tanasichuk, CEO of the Government Technology & Services Coalition and founder of Women in Homeland Security, talks about what small and medium-sized businesses can offer their government partners. She discusses the business of homeland security and the challenges of operating in a “post-truth” environment.6fullThe Chertoff Group005 Is a Lack of Talent Hurting the Security Industry?Is a Lack of Talent Hurting the Security Industry?Mon, 03 Sep 2018 16:00:00 +0000How do you know that your security program is effective? Mark Weatherford,senior vice president and chief cybersecurity strategist of vArmour and senior advisor at The Chertoff Group, weighs in on the role of a Chief Information Security Officer in an ever-changing cybersecurity landscape. He provides insights on managing the relationship with security vendors, the challenge of ransomware, and how a lack of talent is hurting the industry.]]>How do you know that your security program is effective? Mark Weatherford, senior vice president and chief cybersecurity strategist of vArmour and senior advisor at The Chertoff Group, weighs in on the role of a Chief Information Security Officer in an ever-changing cybersecurity landscape. He provides insights on managing the relationship with security vendors, the challenge of ransomware, and how a lack of talent is hurting the industry.]]>34:58cleanHow do you know that your security program is effective? Mark Weatherford, senior vice president and chief cybersecurity strategist of vArmour and senior advisor at The Chertoff Group, weighs in on the role of a Chief Information Security Officer in an ever-changing cybersecurity landscape. He provides insights on managing the relationship with security vendors, the challenge of ransomware, and how a lack of talent is hurting the industry.5fullThe Chertoff Group004 Identifying the Signals – From the Cold War to the Digital AgeIdentifying the Signals – From the Cold War to the Digital AgeMon, 27 Aug 2018 16:00:00 +0000CIA legend and Chertoff Group Principal Charlie Allen reflects on his career in intelligence – from the Cold War to the war on terror. Allen discusses the ways that new technology tools and capabilities are changing the nature of intelligence and how to make sense of all the information we glean in a digital world. He speaks about the critical need for anticipatory intelligence, and the role technology can play. Finally, he warns of the dangers of politicizing intelligence and underscores the importance of “speaking truth to power.”]]>CIA legend and Chertoff Group Principal Charlie Allen reflects on his career in intelligence – from the Cold War to the war on terror. Allen discusses the ways that new technology tools and capabilities are changing the nature of intelligence and how to make sense of all the information we glean in a digital world. He speaks about the critical need for anticipatory intelligence, and the role technology can play. Finally, he warns of the dangers of politicizing intelligence and underscores the importance of “speaking truth to power.”]]>34:53clean4full003 “Everyone Has a Plan Until You Get Punched in the Mouth” - Planning for Cybersecurity Threats“Everyone Has a Plan Until You Get Punched in the Mouth” - Planning for Cybersecurity ThreatsMon, 20 Aug 2018 16:00:00 +0000As the saying goes, no plan survives first contact with an enemy. That’s why incident response planning is so critical when it comes to cybersecurity and protecting your business. David London, an expert on cyber risk management, discusses how companies can make the most of incident response and scenario planning, who needs to be in the room, and what a good plan entails. As organizations grow and acquire new companies, new risks emerge. London provides insights on how to make sure even the weakest link is stronger.]]>As the saying goes, no plan survives first contact with an enemy. That’s why incident response planning is so critical when it comes to cybersecurity and protecting your business. David London, an expert on cyber risk management, discusses how companies can make the most of incident response and scenario planning, who needs to be in the room, and what a good plan entails. As organizations grow and acquire new companies, new risks emerge. London provides insights on how to make sure even the weakest link is stronger.]]>24:52clean3full002 “A Goldilocks Moment:” The Role of Private Equity in Security Spending“A Goldilocks Moment:” The Role of Private Equity in Security SpendingMon, 13 Aug 2018 16:00:00 +0000It’s a good time to be a buyer and a seller, says Chertoff Group President Jason Kaufman, who leads the firm’s mergers and acquisitions (M&A) practice. He tells us how private equity investors are influencing the national security, defense, and information security markets.What’s in store for the new players in private equity and what does it mean for this market? Kaufman tells us why we’re in an economic “goldilocks moment” – and what to do about it.]]>It’s a good time to be a buyer and a seller, says Chertoff Group President Jason Kaufman, who leads the firm’s mergers and acquisitions (M&A) practice. He tells us how private equity investors are influencing the national security, defense, and information security markets. What’s in store for the new players in private equity and what does it mean for this market? Kaufman tells us why we’re in an economic “goldilocks moment” – and what to do about it.]]>22:35no2full001 Securing the Skies: How TSA is Innovating to Identify ThreatsSecuring the Skies: How TSA is Innovating to Identify ThreatsMon, 06 Aug 2018 16:00:00 +0000Ever stood in line at airport security and wondered what’s behind the technology that keeps us safe in the skies? Aviation and transportation security expert Lee Kair talks about how the Transportation Security Administration is tapping technology innovations to identify threats. He shares insights on the challenge of striking the balance between efficiency and effectiveness when it comes to airline travel. And he tells us why you should always opt for the TSA pre-check.]]>Ever stood in line at airport security and wondered what’s behind the technology that keeps us safe in the skies? Aviation and transportation security expert Lee Kair talks about how the Transportation Security Administration is tapping technology innovations to identify threats. He shares insights on the challenge of striking the balance between efficiency and effectiveness when it comes to airline travel. And he tells us why you should always opt for the TSA pre-check.]]>23:51cleanEver stood in line at airport security and wondered what’s behind the technology that keeps us safe in the skies? Aviation and transportation security expert Lee Kair talks about how the Transportation Security Administration is tapping technology innovations to identify threats. He shares insights on the challenge of striking the balance between efficiency and effectiveness when it comes to airline travel. And he tells us why you should always opt for the TSA pre-check.1full